Saturday, October 10, 2015

God Mode is a hidden folder that makes available a range of handy customization for your PC. By enabling God Mode/Control Box you can access all your windows
setting from one location. God Mode works on 32 as well as 64 bit operating system. So lets enable God mode on your computer.

Steps:

1. On your desktop right click and create a New Folder.

2. Rename this folder to the code given below.

ControlBox.{ED7BA470-8E54-465E-825C-99712043E01C}

3. Done, Now double click on this folder and you will have access to all operating system settings at one place.

Friday, October 9, 2015

Today I will show you a simple windows trick.
Basically you can not make folder with no name on windows. This trick
will allow you to make folder without any name. This trick works on any
windows operating system.

Before attempting this trick, try to make a folder with no name and you
will fail to do so.

Steps :

1. Make a New Folder where ever you want.

2. Click on Folder and Press F2 ( Function Key : Shortcut for Rename)

3. Erase the text showing "New Folder".

4. Now keep Pressing Alt (i.e alter key) type 0160.
If you are on laptop then you need to enable your Num Lock and type
from the highlighted number keys not from those below function keys.

5. After that leave alt key and Press enter.

6. Done you just created nameless folder.

Note : Number keys below function keys will not work for this trick. Numbers from NUM pad is valid only.

Tuesday, October 6, 2015

Hackers use many methods to hack your account or get your personal data. Today I
will share 4 Most commonly used methods used to crack password and some solution to get secured.

1. Brute Force Attack

Any password can be cracked using Brute-force attack. Brute-force
attacks try every possible combinations of numbers, letters and special
characters until the right password is match. Brute-force attacks can
take very long time depending upon the complexity of the password. The
cracking time is determined by the speed of computer and complexity of
the password.

Solution : Use long and
complex passwords. Try to use combination of upper and lowercase
letters along with numbers and special characters like @#$& etc. Brute-force attack will take hundreds or
even thousands of years to crack such complex and long passwords.

Example: Passwords like "iforgot" or "yourpassword" can be cracked easily whereas computer will take years to crack passwords like "aN@42lL00"

2. Social Engineering

Social engineering is process of making someone to trust you and
get information from them. For example, Sometime hackers call the victim pretending to be from bank and
ask for their credit cards details. Social Engineering can be used to
get someone password, to get bank credentials or any personal
information.

Solution : If someone
tries to get your personal or bank details ask them few questions. Make
sure the person calling you is legit. Never ever give your credit card
details on phone.

3. Phishing

Phishing is the most easiest and popular hacking method used by hackers
to get someone account details. In Phishing attack hacker send fake page
of real website like facebook, gmail to victim. When someone login
through that fake page his details is send to the hacker. This fake
pages can be easily created and hosted on free web-hosting sites.

Solution : Phishing
attacks are very easy to avoid. The URL of this phishing pages are
different from the real one.

Example : URL of phishing page of
facebook might look like facbook.com (As you can see "e" is missing). Always make sure that websites URL is correct.

4. Guessing

This seems silly but this can easily help you to get someones password
within seconds. If hacker knows you, he can use information he knows
about you to guess your password. Hacker can also use combination of
Social Engineering and Guessing to acquire your password.

Solution : Don't use
your name, surname, phone number or birth-date as your password. Try to
avoid creating password that relates to you. Create complex and long
password with combination of letters and numbers.

Saturday, October 3, 2015

There are many sites which are blocked by government because of breaking
laws of their country. People download many software to open these
sites but end up being infected by malware, virus. Today i will share a
trick
with you which can help you easily open banned sites without
downloading anything.

Using the Group Policy Editor

1) Click on Start. Go to Run. Users running Widndows 10, Windows 8/8.1, Windows 7 or Vista, go to Search.
2) Type gpedit.msc and press Enter.
3) Navigate to User Configuration/ Administrative Templates / System.
4) In the work area on the right side, double click on "Prevent access to the command prompt".
5) In the popup dialog, encircle Disabled and click OK.
6) You should be able to immediately use the command prompt. If you still cannot access it, restart your computer.

*Home editions of Windows do not contain the Group Policy Editor.

Using Registry Editor

Registry
Editor is an in-built tool in Windows. You can use it to easily enable the command prompt
by simply modifying a registry key. To do so, follow these steps.

1) Users running Windows 10, Windows 8/8.1, Windows 7 and Windows Vista, go to Start>Search. Users of Windows XP, got to Start>Run.
2) Type regedit and press Enter.
3) Registry Editor will start. If it is disabled, you will need to enable Registry Editor first.
4) Navigate to
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System. If the
Windows key is not there, you will need to create a new key called
Windows. Also, if the System key is not there, you will need to create
it.
5) In the work area on right side, double click on DisableCMD and
set its value to 0. If you cannot locate DisableCMD, you will need to
create a new DWORD value called DisableCMD and set its value to 0.
6) Close the Registry Editor.

Thursday, October 1, 2015

Most browsers offer the capability of remembering usernames and
passwords. Most of us use this feature to automatically save our
usernames and passwords in order to log in more
quickly. What if you forget the saved username and password?
As web browsers hide passwords using stars/asterisks/dots there is no way in which a user can recover his password by
simply looking at what browser shows. Here are some tips and tricks
that you can use to reveal your password for a website when you have
forgotten but your browser remembered.

Use Developer Options to show password

Open the website for which your browser has the saved password, then right click on the password box and click Inspect Element.

A code like this would be displayed:-

<input type="password" class="inputtext" name="pass" id="pass">

Change the type from password to textso that the code looks like:-

<input type="text" class="inputtext" name="pass" id="pass">

Your password would be immediately visible.

Mozilla Firefox Add-on

Show My Password
is a Firefox Add-on which automatically converts hidden
passwords into human readable form. To use this add-on, just open
the webpage with the hidden password and click in the field containing
the hidden password. This add-on will automatically reveal the password
to you.

Software to reveal hidden passwords behind stars

There are free software that you can use to recover forgotten passwords. Some of them are:-

Password Viewer:Password Viewer
by IT Samples is another application that can be used to unmask
passwords hidden behind stars. It allows you to view passwords not only
in web browsers but also in any program.

Asterisk Logger:Asterisk Logger
from Nirsoft is one such software. It automatically displays the hidden
password whenever a window containing a hidden password is detected.Note : These tools are browser
independent. These software will not be able to show User
Account Control /Windows logon password.

Wednesday, September 30, 2015

Every business has some documents that need to be kept confidential.
They can be anything from financial records to sensitive personal
information to national data. Sometimes data needs to be destroyed because there is no physical or
digital space to store it, and it cannot be thrown away in a
random place. Here are some ways in which anyone can
dispose confidential data.

Confidential Paper Documents

The simplest way to destroy confidential paper documents is to put them
through a shredder. All confidential files can be shredded with little
or no effort. Depending on how confidential your
data is, you can choose the right kind of shredding process. Shredding
services will also shred your documents for you, at a fee. If you are an
individual and cannot afford a shredder , you can
burn the paperwork in a safe place to destroy them completely.

Confidential Data on Your Computer

If you use computer, you would have important data and
files on it which you might not prefer others to have a look at.Q. What is
the best method of getting rid of your confidential data so that no one
can access it?
Most of us think that the delete key (or shift+delete combination) will help to get rid of these from the system
forever, but that is not exactly the truth. Any file that has been
deleted from the hard disk can be retrieved by anyone, who knows how to recover deleted documents.

Erasing the Hard Drive

Erasing hard drive clean all data, This is one of the ways in which you
can remove the confidential information. There are programs that
overwrite storage with random data so that the original files cannot
be retrieved. You can also try Guttmann Method, in which the files are overwritten 35 times. CDs, Hard
Drives and other disks must be destroyed to prevent information from
being accessed.

Hard Drive Shredding

Programs that erase files and write over them can make your files
nearly impossible to retrieve. However, in some cases, it is still
possible that data is recovered by an expert. To avoid this, the
hard drive can be shredded entirely. CDs and drives can be destroyed by breaking and drilling holes. The greater the number of holes you drill in the drive, the less
likely it is that the data can be retrieved, even by an expert.

All memory chips, hard drives and other similar devices can be shredded
by a digital shredder, which destroyed devices completely. This makes it impossible to
recover any information from the drive.

Tuesday, September 29, 2015

Have you watched “The Matrix”? Of course, you have. You can make matrix type running codes just by using notepad and Command Prompt. Just copy and paste the code given
below in Notepad and save the file as "a.bat" or *.bat.

Monday, September 28, 2015

VLC is free and open source media player, great at playing media of
many formats. Also It
can be used to easily convert videos from one format to other.
Converting videos with VLC media player is fast. It can also
be used to resize videos from one size to other for when you need to
shrink videos to fit in your mobile devices. It can also used as video cutting tool.

Convert Videos with VLC Media Player

To convert videos with VLC media player, follow the steps given below:-

1) Open VLC media player.
2) Click on Media in the Menu bar.
3) In the dropdown menu, click on Convert/Save. Alternatively, you can press Ctrl+R to directly reach media options.

4) Click on the Add button on the right of the File selection box to load the video whose format you want to change.
5) In the following dialog box, click on browse to select the destination where your converted video will be.

6) In the profile selection option, select from a pre-configured profile
of the output or customize it by clicking on the Settings icon on its
right. You can select from a range of encapsulation, video and audio
formats in the following dialog box if you wish to customize the output.
7) Click on Start to begin conversion.
8) VLC's progress bar will show progress. Do not close the player when
it is converting videos as it will result in output video getting
corrupted.

Sunday, September 27, 2015

Command Prompt can help you to find if someone you don't know is connected to your computer stealing private data. Just execute netstat -a
and the command prompt will return a list of computers that your
computer is connected to. In the results returned, Proto column gives
the type of data transmission taking place (TCP or UDP) , Local address
column gives the port with which your computer is connected to an
external computer and the Foreign Address column gives the external
computer you are connected to along with the port being used for the
connection. State gives the state of the connection (whether a
connection is actually established, or waiting for transmission or is
“Timed Out”).

These tricks work on Windows 10, Windows 8/8.1, Windows 7, Windows Vista, Windows XP and all previous versions of Windows.

Saturday, September 26, 2015

Windows Task Manager is used to view details about processes running on
your computer. It can be used to terminate programs that are
misbehaving. Most spyware and viruses disable it to prevent themselves from being
closed through it. Some administrators also disable Task Manager to
prevent other users from closing important security programs like antiviruses
and anti-malwares.
In such situations, running the Task Manager will give the "Task Manager has been disabled by Administrator"
error. However, there are some tricks you can use to re-enable task
manager and close those harmful programs manually.

Registry
Editor can be used to modify registry keys
which tell Windows how it should work. A simple registry modification
can be used to bypass the Task Manager block. To do so, just follow the
steps:-

Click on Start. Go to Run. If you use Windows 10, Windows 8/8.1, Windows 7 or Windows Vista, go to Search.

Type regedit and press Enter. Registry Editor will start. If Registry Editor is also disabled, you will first need to enable registry editing.

Through the left hand navigation pane, navigate to
HKEY_CURRENT_USER\Software\Microsoft\ Windows\ Current
Version\Policies\System. If the System key is not there, you will need
to create it.

In the work area, locate "DisableTaskMgr". If this value is not
there, you will need to create a new DWORD value called DisableTaskMgr.
Double click on it. A window will pop up.

Enter its value data as 0 and press OK.

Close Registry Editor.

If Task Manager is still disabled, restart your PC.

Enable Task Manager from the Group Policy Editor (Gpedit.msc)

Group Policy Editor is a feature in Windows which is
used to edit local policy settings. It can also be used to enable Task
Manager. To do so, just follow the steps given below:-

Run TaskManager.bat as Administrator if you use Windwos10, Windows 8/8.1, Windows 7
or Windows Vista. In Windows XP, simply open the file. A command prompt
window will flash for a second and then disappear indicating successful
execution.

Friday, September 25, 2015

Registry Editor is a useful utility in Windows which allows users to
easily change advanced Windows settings by altering registry keys
present in a hierarchical arrangement called the Windows Registry. Being such a powerful tool, Registry Editor is not totally
error-proof.
A simple virus infection can make it useless or administrator has actually disabled Registry
Editing. When you try to open the Registry Editor in one such computer,
you are likely to receive the“Registry editing has been disabled by your administrator” error. Due to this, it is impossible to remove this restriction using the Registry Editor.

Enable Regedit by simply running a CMD Command

Save
the file as RegisteryEnabler.bat. Run this file as Administrator if you
use Windows10, Windows 8/8.1, Windows 7 or Windows Vista. In Windows XP, simply open
the file. CMD will flash for a second and then disappear. This indicates
successful execution.

Thursday, September 24, 2015

Have you ever deleted a file that you did not wish to and wanted to
recover it but did not find it in the recycle bin? You probably deleted
it permanently with Shift+Delete or emptied the Recycle Bin. Now what?
Don't worry, you may still have a chance to get it back.

Q. But how do the software undelete deleted files?

When
files are deleted, Windows does not delete them from your hard disk.
It marks the storage space as empty for new data to be written
and deletes the index entry that tells the location of those files.
Unless, new files are written on that space, the deleted files are still
recoverable. That's what allows these software to recover deleted
files.

Recuva [Free version available]

Recuva
offers a wizard based interface to unerase files. Recuva offers
scanning deleted files based on their type (music, pictures, videos
etc.). It also allows deep scanning in case a file you deleted is
unrecoverable via normal search. Recuva offers securely deleting files. Recuva also has a portable version that you can keep in your flash drive.

This recovery software support recovery from memory sticks,
digital camera cards and MP3 players. This also support undeleting all types
of pictures, software, movies and documents from both FAT and NTFS
formatted drives. This tool work on Windows 10, Windows 8/8.1, Windows 7, Windows Vista and Windows XP.

Some important tips to increase the chances of getting your deleted files back:-

1) When a file is deleted accidentally on a storage device, make
sure that you don't do anything on it as doing that would increase the
chances of new data being written over your deleted files, which would
make file recovery impossible.

2) If you have deleted files on your main computer (the one you
are using right now), do not use it.
Keep it running and go to another computer, download Recuva .
Then plugin the flash drive in your current system and perform file
recovery.

3) If one software fails to recover your deleted file, it does not mean that another one wouldn't recover it too.

Wednesday, September 23, 2015

Wi-Fi Hotspot Using Connectify

If you want to setup a Wi-Fi hotspot with numerous options and a nice interface, Connectify has a great application called Hotspot
that lets you create a hotspot from your internet connection. With Pro version you can even make your PC a Wi-Fi
repeater or a wired router.
Connectify Hotspot
is great if your ISP charges per device, Its excellent if you don’t want to pay more to connect more devices.

PDF or Portable Document Format is one of the most popular format
for document sharing. Its popularity is mainly because PDF files are
multi-platform, smaller in size, can be opened on most devices with free
software and are difficult to edit as they are "read only".

Also PDF files being "read only" by default, there are certain tools
and software you can use to change the contents of a PDF file for free
without use of any paid software like Adobe Acrobat.

Edit PDF Files Online

If you are looking for basic PDF editing (changing bits of text to hide
your personal information or simply filling a form), you can try PDFEscape
to edit PDF files right in your browser. It allows you to modify text,
images and add annotations with the help of custom shapes and arrows.
One of PDF Escape's great feature is its ability to password protect PDF
files. It also allows you to hide text with its white out tool (this is
different from deleting it). It even lets you edit password protected
PDF files and add hyperlinks to web addresses.

Important : To use PDF Escape, you need a JavaScript enabled web browser.

Tuesday, September 22, 2015

If you have a flash
drive or an external hard drive that currently has FAT32 file
system and you want to change it to NTFS, because FAT32 does not support
handling large files (over 4GB)
but there is just one problem, you don't want to lose your saved data.

Then this is right place for you, You can achieve
seamless transition from FAT to NTFS without involving any data loss.

There are many software's that support File Format conversion but the Convert command is one of the easiest ways to do so. Follow the steps below to know how:-

Important: While this method works perfectly, I would still advise you to backup your data in case anything goes wrong.

FAT 32 to NTFS Conversion Steps :

1) Go to Computer, and note the name of the drive whose file system you wish to convert.
2) Click on Start.
3) Type cmd in the search bar if you use Windows 7, Windows 8/8.1,
Windows 10 or Windows Vista. If you use Windows XP, click on Run and
then execute cmd.
4) Execute "chkdsk d: /f " (without quotes) where d is the letter
of the drive to undergo conversion. This checks the drive for errors
and fixes them automatically.
5) Execute "Convert d: /FS:NTFS" (without quotes). d is again the letter of the drive to be converted.
6) The command prompt will start the conversion process and after a few minutes, CMD will say that conversion was successful.
7) You can check it in the properties of the drive through right click<Properties.

This command can also be used to convert FAT16 disks and works on
Windows 8/8.1, Windows 10, Windows 7, Windows XP and Windows Vista.

Important : This method cannot be used to
reconvert NTFS file system back to FAT32. To reconvert back to FAT32,
you will need to format the entire drive which will definitely cause
data loss.

This trick allows you to disable access to your USB(Universal Serial
Bus) ports on your Windows based PC to prevent people from taking out
data without permission or spreading viruses through the use of USB (pen
and flash) drives.
To use this trick to disable USB ports, follow the steps given below:-

Click on Start.

Click on Run. If you cannot find RUN, type it in the search box.

Type "regedit" without quotes. This will launch the Registry Editor.

Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.

Try it yourself to make your PC invulnerable from data theft and malware
which spread through USB ports. This works on Windows XP, Windows
Vista, Windows 7 and Windows 8/8.1, Windows 10.

Note: This trick also disables access to your USB connected
peripheral devices. So, do not use it if you have USB connected keyboard
and mouse.Values of [Start] key: Value 3 is for Enabling Ports & Value 4 is for disabling Ports.

Monday, September 21, 2015

Most of us shutdown our computers using the power button given in the
Start menu. Some of us use the physical power button on our machines.
Very few people actually use other means of shutting down a computer and
even less is the number of people who use the command prompt to
shutdown a computer.

Required
A computer running Windows (XP, Vista, 7, 8 or 8.1, 10) with the command prompt working perfectly, i.e. not disabled by a virus.

Initial Steps
1) Press Windows Key + R.
2) Enter CMD and press Enter.

This will start the command prompt. Follow the instructions below depending on what you want to do to your machine.

Shutdown Your Computer
Type "shutdown -s" without the quotes in the command prompt and press Enter. Shutdown is the command being executed and the switch -s tells the computer to shutdown.

Restart your Computer
Type "shutdown -r" in the command prompt and press Enter. In this case,
the command switch -r is telling the computer to restart after shutdown.

Log Off the Current User
Type "shutdown -l" in the command prompt and press Enter. The -l command switch tells the computer to log off.

Hibernate a Your Computer
Type in "Rundll32.exe Powrprof.dll,SetSuspendState" without the quotes
and press Enter. Your computer should hibernate, if it does not, then
you must enable hibernation to do this from control panel.

Shutdown your computer after a specific time
Type "shutdown -s -t 60" to shutdown your computer after 60 seconds.
Upon executing this, a countdown timer displaying a warning message will
be shown. This command uses the -t command switch followed by a
variable (which is 60 in this case) which represents the number of
seconds after which the computer will shutdown.

Display a Message containing the reason for shutdown
Type shutdown -s -t 500 -c "I am tired. I don't want to work anymore." (with the quotes) in the Command Prompt and press Enter. The -c switch
is used in the code to give the reason for shutting down and what is
followed in quotes will be displayed in the dialog box as the
reason. This can be used to display all sorts of funny messages.

Stop a System Shutdown
Type "shutdown -a" and press Enter. This will stop the system from
shutting down if the countdown to shut down has not reached 0.

Sunday, September 20, 2015

If you are bored of your old processor name and want a new one then its the right article for you :P.
It is very easy to change your processor name permanently by creating a
registry key and placing a shortcut to it in the Windows start up
folder. To do so, just follow the steps given below:-

To
change the processor name, edit the part of the code given in green.
Also understand that \0 in the above code should only be present if
Windows store your processor name at that location. Open the Registry
Editor and navigate to the above mentioned keys to check whether or not
to include the \0.
3. Click on File Menu, click on Save As and select "All Files" in the
Save as Type option. Save the file as namechange.reg or *.reg.

4. Create a new shortcut on your desktop. Enter regedit / S "Location
of the .reg file" as the location of the item. For example, enter regedit /S "C:\namechange.reg" if your registry file is located in the root of C:\ drive.

5. Copy the created Shortcut file.

6. Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup(in Windows XP) or toC:\Users\
User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
(in Windows 8, Windows 7 and Windows Vista. Also remember that AppData
is a hidden folder.) if C: is your System drive.

7. Paste the copied file.

This registry file would now execute each time when Windows starts and the Processor Name String would be modified each time.

While most of us are already aware of obvious keyboard shortcuts like
“Alt+F4” and “Ctrl+C”, there are many shortcuts. Keyboard shortcuts if used properly could save a
lot of time and effort.

Windows key+D: This shortcut is the keyboard equivalent of “Show
the Desktop”. It is useful for quickly minimizing every open window when
someone walks in and you are doing some private work.

Ctrl+Shift+Esc: This shortcut directly starts the task manager.
While Alt+Ctrl+Del was used to bring out the Task Manager in Windows XP
and earlier versions, in Windows 10, Windows 8.1, Windows 8 and Windows
7, it just brings up the lock this computer screen.

Ctrl+Click: This shortcut is useful for opening a link in a
background tab. This is useful when you have to load a page without
leaving the current one.

Alt+Print Screen: takes the screenshot of the current active
window as opposed to just Print Screen which takes the screenshot of the
entire screen.

Shift+Click for Yes to All and No to All: If you have a lot of
dialog boxes asking yes and no question, just shift+click Yes or No on
one to yes all or no all.

Ctrl+C on an error dialog box to copy its contents: Suppose your
computer is giving an error message and you want to copy its contents to
send to the support guy, what do you do? Just press Ctrl+C while the
dialog box is highlighted and its contents will be copied to your
clipboard.

Ctrl+T: This keyboard shortcut opens a new tab in internet browsers.

Ctrl+Shift+T: Reopens the last closed tab.

Alt+Enter after writing the domain name in the address bar of your browser to insert .com automatically.

Shift+Enter inserts .net domain name extension.

Ctrl+W: This shortcut closes the current tab in your browser quickly.

Windows key+M: Minimizes all the open windows.

Ctrl+L: This shortcut allows you to quickly jump to the address bar of your web browser.

Windows key+Pause/Break: Quickly open the system properties dialog box.

Ctrl+Shift+Delete: This shortcut opens the option to delete your
browser's history, cookies, cache and other details that it stores while
you browse the internet. This shortcut is extremely useful for the
privacy conscious.

Windows Key+L: This shortcut locks your computer.

Ctrl+H: makes the history appear.

CTRL+B: Bold

CTRL+U: Underline

CTRL+I: Italic.

Alt+Tab: Useful for quickly cycling between running applications. Press along with Shift to cycle backwards.

Ctrl+Tab: Cycle between tabs in your browser.

Ctrl+F5: Clears the cache and refreshes the current tab.

Shift+Right click: Open alternate right click options.

Alt+Double click: Open the file's properties. Alt+Enter can also be used for this.

Alt+Select: This shortcut allows you to select rectangular blocks
of text in Word processors, something that is not possible with simple
select.

Rufus is small in size (nearly 600 KB) and claims to be faster at
creating bootable USB drives than most applications of its type. Rufus
is also portable which means that you need not install this software to
use it. Just double click on the executable file and the application
will start working. Rufus also allows you to add fixes to use your
bootable flash drives on older computers having BIOSs which do not
support booting from them.

However, Rufus can only create bootable flash drives from ISOs
meaning you need to have an ISO image of the CD or DVD of the OS of
your choice.

I do not think this should be too much of a problem considering how easy it is to create ISOs from DVDs and CDs.

How to use Rufus?

1) When you start Rufus, the first option that you will see is Device:.
It contains all your connected USB drives. If you plug in a USB drive
after starting Rufus, the drive you have connected will shortly be
available here.

2) You will not need to modify the Partition Scheme and target system
type, as the default choice is suitable for making the USB drive work on
both UEFI and legacy BIOS computers.

3) Change the file system from FAT32 to NTFS
from the dropdown menu. This is the file system with which your USB
drive will be formatted with. Do note that older computers will not boot
from a flash drive formatted as NTFS. Do not modify the cluster size.
Enter the name you want for your USB device in the Volume label box.

4) Check the Create a bootable disk using checkbox if it is not already checked. In the dropdown menu next to it, select ISO image. Click on the button right to it to locate your ISO image.

Do note thatRufus will format your USB drive deleting everything on it
before making it bootable. So, make sure that it does not contain any
important data.

5) Click on Start to format your USB drive and extract all files of the ISO to it.

To install the OS, restart your computer and select your USB device as the primary boot option in the BIOS boot menu.

CompatibilityRufus works on all the latest versions of Windows and can be used to extract the following ISOs to a bootable USB drive:-

With hackers becoming more and more sophisticated, most of us are
worried about the safety of personal data. There are many options
available to protect data but none comes close to encryption
in terms of safety offered. There are easy to use methods that allow to
encrypt important files and folders in Windows.

Encrypting files in Windows using the Encrypting Files System (EFS)

Windows
offers an inbuilt encryption method called EFS to protect sensitive
data from unwanted users. EFS can be used only on hard drives formatted as NTFS and on professional and premium editions of Windows 10, Windows 8.1, Windows 8, Windows Vista or Windows XP. Home editions of Windows do not support this.

To encrypt files with EFS, follow these steps:-

Right click on the file or folder you want to protect and click on Properties at the bottom of the menu.

This will bring up the Properties window. In this window under the General tab, click on Advanced.

In the Advanced attributes window, tick on Encrypt contents to secure data option.

Click OK and Apply.

If the file is encrypted successfully, its name will generally be visible in green font.

If you encrypt files and folders with EFS, it would not change how you
access those files and folders. You would still be able to read, modify
and delete those files as long as you are logged into the user account
that encrypted those files. However, other users from would not be able
to do this. For example, if you carry the encrypted file in a flash
drive, you would not be able to access it from other computers. To
access it from other computers, you will need your encryption key.

Important :

Make sure that you backup your encryption key when Windows prompts you
to do so. It will be required in case you want to access the encrypted
files from a different user account or from a different computer.

To back up your encryption key, click on the Back up now option in the pop up that comes when you first encrypt a file or folder. Then, click Next on the window titled Certificate Export Wizard.
Enter a password for your certificate (make sure it is tough but also
easy to remember), choose a location to save it, give it a name and
click Finish.

In case Windows does not prompt you to back up your encryption key, you can back it up from the File Encryption Certificates manager.
Since, EFS relies on your user account to give access to protected
files, it is important to choose a strong password for your Windows user
account.

EFS is relatively quick and hassle free but not totally secure as
Windows stores an unencrypted version of protected files in the
temporary folder (when you access them) which can be easily accessed by
any experienced computer user. To overcome this weakness, ensure that
you clean up your temporary files with the Disk Cleanup utility every time you access your protected files.